Guidelines Using Social Sites …If I am not for myself, who will be for me? If I am not for others, what am I? And if not now, when?

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Cyber Safety Assessment Review
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
What is identity theft, and how can you protect yourself from it?
A Guide to Internet Safety High School
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
This week is anti-bullying week.
e-safety and cyber bullying
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Netiquette Rules.
Starter for 10 Unit 11: Facebook Transform IT SFT11_Facebook.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
What do I need to know?.   Instant Messages  Social Networking.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams Stevie's Scam School videos
INTERNET SAFETY FOR STUDENTS
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Safe online shopping Suitable for: Improver.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
Technology is a wonderful thing that few of us could see ourselves doing without and when it comes to personal safety it can be of great benefit. However.
10 Privacy Settings Every Facebook User Should Know.
Created by Amber Craddock, Kylee Stone & Caleb Truette.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Safety In CyberSpace. ‘Report Abuse’ in action Look for this link on websites Microsoft have made a real commitment Approx £30,000 per month revenue.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information guide.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Reliability & Desirability of Data
Lecture 3 Title: Web blog By: Mr Hashem Alaidaros.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Controlling Your Social Networking Privacy Settings Stay safe online!
 Facebook  Twitter  MySpace  Windows LiveSpace.
Safe Use of Social Media Cadets – Air Force’s Future.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
What makes a good interactive resume? Click for detailed information Multimedia Navigation Communication.
Visiting Angels Presenter: Social Angel Facebook.com/VisitingAngelsCorporate Social Care.
Social Networking Guide Or the web is not a private place.
1. Go to 2. Complete the requested information.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Protecting Yourself on Social Media – Friend Requests And Messages.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
An objective Cashcrate Review. Can I make money with Cashcrate?
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
TechKnowlogy Conference August 2, 2011 Using GoogleDocs for Collaboration.
Gosbecks E-Safety Guide
E – SAFETY Being safe online
Creating your online identity
Social Media Security: Understanding how to keep yourself safe.
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
SafeSurfing Module 5 September 2016.
How to Protect your Privacy on Facebook Facebook Privacy.
Internet Safety – Social Media
Presentation transcript:

Guidelines Using Social Sites …If I am not for myself, who will be for me? If I am not for others, what am I? And if not now, when?

… a chance for you to help poor and under privileged society.

Welcome to M-EYF Social networking sites can be risky for users if members don't follow safety precautions and aren't discreet about what they post. There are many social networking sites on the Internet. Facebook and My Space are among the most popular. What many people don’t realize about social networking sites is that the information they post there can be used against them in a variety of ways. Often sexual solicitation and harassment can occur through such sites. In addition, the distinction between genuine friends and social network acquaintances can become blurred. “Relationships” formed from social network sites make it possible for “friends” to misrepresent themselves under the protective umbrella of anonymity. The risks are varied and numerous. The Risks Involved with Using Social Networking Sites Read more at Suite101: The Risks Involved with Using Social Networking Sites like Facebook, Orkut, MySpace etc... …Where there is charity and wisdom, there is neither fear nor ignorance.

“Every person above the ordinary has a certain mission that they are called to fulfill.” Guidelines for Using Social Networking Sites 1. Introduction Social networking sites such as Facebook, Beebo, YouTube, Twitter etc have become very much part of our everyday life as we use them to keep up with friends, share photographs exchange ideas and so on. These sites work by sharing information with others: but how much information do you want to share? Would you tell a complete stranger where you were last night, with whom, what you did and to whom? Probably not, but when you use these social networking sites you could be doing just that unless you take some simple precautions. So stop and think for a moment: when a web or social networking site is asking you to provide personal information……. Do you know who has access to the information? Do you know how the information will be used? Are you happy to share this personal information? You probably don’t know the answer to these questions so let’s have a look at what could be going on in the background and how you can protect your privacy and private life.

M otivate E ncourage Y our F uture “Vision looks inward and becomes duty. Vision looks outward and becomes aspiration. Vision looks upward and becomes faith.” 2. Security Security is very important and you need to know whether the site is secure or not. Look for a yellow padlock symbol in the bottom right corner of the screen. If it is displayed then it is probably safe to enter very personal details like your credit card number and other such personal details. Be wary of organisations that you might think are trustworthy: if there is no padlock symbol displayed it’s not secure. But even if the padlock symbol is displayed, be cautious: clever programmers can “edit” web pages and insert spoof symbols. Check the site’s privacy statement to see what you are signing up to. This may seem like a chore, but may save you from lots of trouble later on. You need to know whether the site will protect your details, whether they take ownership of the data you put up to the site and whether they enforce their privacy policy. If in doubt, don’t (unless you are prepared to run the risk of your data getting into the wrong hands).

“Coming together is a beginning. Keeping together is progress. Working together is success.” 3. Protect your identity! OK so you put personal information onto a social networking site: who’s going to benefit from this? Networking sites make money by selling information to marketing companies who in turn use it to try and sell things to you and you friends. The more users a site can get the higher a price it can charge for its information. It will pay you to check the sites privacy policy to see what they do with your information. It’s therefore very important you protect your identity. Most social networking sites have privacy settings that allow you to determine who can see your user profile and contact information. It’s a good idea to set up an e‐mail account specifically for use with social networking sites. Keep it completely separate from your normal e‐mail account. The name you use should not be your real name, but choose your screen name with care to avoid unnecessary (and potentially unwelcome) attention. Who knows what images names conjure up in some people’s minds! Whatever you do don’t use your real name, e‐mail address or any other information that would enable someone to identify you. Having chosen a screen name, only share it with those you really trust. Take very great care in responding to requests for information about yourself. Think, just who is the requestor and why is this information being sought? Be especially careful of requests for financial information or exceptionally good financial offers: they are rarely what they seem! Finally, remember it’s not just your identity you are protecting, it’s also all your friends’, your family, anyone about whom you have published information whose identities you need to protect.

“Coming together is a beginning. Keeping together is progress. Working together is success.” 4. Watch out for cookies! Cookies are files which web sites use to store information about you. Most are fairly harmless, but over a period of time the file will build up a dossier of information about you, your interests and activities. This can be sold on to marketing companies who will use the information to target you with specific advertising. However, they can equally be used by the unscrupulous to set up frauds and other criminal activities. Most internet browsers can be set to tell you when a cookie is installed and Microsoft Internet Explorer will allow you to block cookies. Be aware! The search engines you use log your IP address (that’s the exact computer you are using), the search string, cookies launched, date time and so on. Your search is not anonymous and the data may come back to haunt you in the future.

“Coming together is a beginning. Keeping together is progress. Working together is success.” 5. Be careful what you say or show. Be very careful what you say or show about yourself or anyone else! Don’t post details you or anyone else might find embarrassing or you don’t want family, lecturers, and potential employers etc to know. Accessing social networking sites from University computers means you are bound by the University’s Acceptable Use Policy. So don’t: Say defamatory things about people or organisations Say anything that is racially motivated Engage in any commercial activity Engage in any criminal activity Tell lies Post inappropriate pictures or videos Breach of the policy will render you liable to disciplinary action. Is it really worth the risk?

“Coming together is a beginning. Keeping together is progress. Working together is success.” 6. Long live the data Once you have posted information to a web site, it can be almost impossible to remove it because of file sharing, archiving and other considerations. Even if you unsubscribe from a site, your information may remain visible for a long time.

“Coming together is a beginning. Keeping together is progress. Working together is success.” 7. I want to use Facebook – how do it do it safely? Facebook has a number of options that will restrict who can see what in your account so it is worthwhile spending a few minutes setting the account up. The default setting is to make all your information visible by all your friends and networks; potentially several hundred thousand people! Public search listings make limited information about you (your name and profile picture) available to people who are not logged in to Facebook. This information is available to search engines like Google. When you first register, enter only very basic information about yourself. Then click on the Privacy option at the top of the screen and adjust the settings before adding any more information about yourself. If you want to add a picture of your self, use one that is not immediately identifiable as you i.e. out of focus or a caricature. If your picture includes other people, make sure you have their permission before posting it to Facebook. Set profile privacy settings to: “only my friends” “Photos tagged of you" and "Videos tagged of you" to "Only My Friends" Contact information: consider setting this to “No‐one” (the default is “Only My Friends”) 'Search' privacy settings: ‘Who can find me in search’ – Default is “all my networks and all of my friends”. Only choose “Everyone” if you are willing to let anyone see you are in Facebook Deselect the “Allow my public search listing to be indexed by external search engines”

“Coming together is a beginning. Keeping together is progress. Working together is success.” Facebook 'walkthrough' ‐ adjusting your privacy settings Facebook 'walkthrough' ‐ adjusting your privacy settings ‐ gives step‐by‐step guidance on adjusting your privacy settings and explains why you should consider choosing the more private options. So who’s my friend? Once you have nominated someone as a friend, they will be able to see all information, including photographs and videos you have marked as “viewable by friends”. Is that what you want? You can make people “limited friends” which gives them access to a cut down version of your profile. This useful for people you might class as “associates”, people you are not happy about sharing your full personal information with.

“Coming together is a beginning. Keeping together is progress. Working together is success.” 8. Are there any other dangers I should be aware of? Yes, there’s a practice known as “phishing” or “pharming”. This is where e‐mails are sent randomly and apparently from a well respected organisation to many people. They are aimed at getting you to give away personal information, particularly credit/debit card details which can then be used in all sorts of ways. The messages often contain links which are false and redirect you to a fake website. Phishing is on the increase at the moment and universities seem to be prime targets for these attacks. These are generally well written e‐mails, which appear to come from the University helpdesk or central administration and ask for login information. If this is given, the account details are then used to send spam from your account and, of course, your compromised account could be used to access any services you have privileges to, such as your personal details in myCourse.

Support Us Consciously or unconsciously, everyone of us does render some service or another. If we cultivate the habit of doing this service deliberately, our desire for service will steadily grow stronger, and it will make not only for our own happiness, but that of the world at large.” Mahatma Gandhiji “The sole meaning of life is to serve humanity.”